Skip to main content

AWS - S3(Simple Storage Services)

 AWS - S3 STORAGE CONCEPTS

S3(Simple Storage Service):

  • It is one of the first service that has been produced by AWS.
  • S3 is one of the safest place to save files.
  • S3 provides IT teams and developers with secure, durable, highly scalable object storage.
  • It is easy to use, store, and retrieve any amount of data with a simple web services.

S3 storage methods:

  • S3 is Object-based storage, where it can store the images, word files, pdf files, etc.
  • Range of files stored from 0 bytes to 5 TB.
  • Files are stored in Bucket. A bucket is like a folder available in S3 that stores the files.

Creating a bucket, URL look like:

https://s3-eu-north virginia-1.amazonaws.com/Raghuldavid

  • Region name ---- s3-eu-North Virginia
  • Bucket name ---- Raghuldavid
Advantages of Amazon S3:
  • Security
  • Creating buckets
  • Storing Data in Buckets
  • Download Data
  • Permissions
  • Standard Interfaces
S3 objects:

It is a simple key-value store. Some of the object consists of:
  • Key
  • Value
  • Version ID
  • Mega data
  • Sub resources
  • Access control information
Bucket creation:
  • It is container used for the objects and every object is incorporated in a bucket.
  • A bucket has no limit to the amount of objects that it can store.
  • AWS account that creates a bucket can delete a bucket, but no other user can delete the bucket.
Creation of S3 bucket:
  • First of all, Sign into the AWS management console, It may ask your bank account details for accessing AWS console and 2RS amount will be credited first and further charges will be credited according to our usages.
  • Services of AWS screen appears, then go to the Storage service.
  • In storage service, S3 and many of the services available related to the storage will be available.
  • Go to the S3 and click Create bucket.
  • Enter the Bucket name and it is like a folder that stores the objects. A bucket name should be unique.
  • After creation a bucket, You can upload type of files such as jpeg, jpg, mp4, mp3, html etc..,
  • Upload the file and creation of bucket is done.
  • Make the file public so that you can access the file in any mode. 

Tips to be a professional:

  • Take the initiative.
  • Maintain effective work habits.
  • Manage your time efficiently.
  • Demonstrate integrity.
  • Provide excellence.
  • Be a problem-solver.


-RD💪









Comments

Popular posts from this blog

ETHICAL HACKING

  ETHICAL HACKING E thical H acking is a structured hacking performed to expose vulnerabilities in a system, using a tools and techniques with organizations knowledge.  The act of hacking is defined as the process of finding a set of vulnerabilities in a target system and systematically exploiting them. Ethical hacking as a discipline discerns itself from hacking by adding a vital element to the process. The process becomes a legal activity and since the hacker takes permission prior to hacking into system, it is legally made sure that he has no malicious intent. This is normally performed by making the ethical hacker sign contracts that legally bind him to work towards the improvement of the security of the company. ETHICAL HACKER: An Ethical hacker is a computer security specialist, who hacks into a system with the consent or permission of the owner to disclose vulnerabilities in the security of the system in order to improve it.  Types of Hackers: White hat hackers Bla...

Linux OS introduction

 LINUX OPERATING SYSTEM Linux Introduction:   L INUX is an operating system or a kernel distributed under an open-source license. It is one of popular version of UNIX operating system. Linux was designed considering UNIX compatibility Its functionality list is quite similar to that of UNIX. Components of Linux System: Linux OS has primarily three components; 1. Kernel: It is the core part of Linux. It is responsible for all major activities of this operating system. It consists of various modules and it interacts directly with the underlying hardware. 2. System Library: These libraries implement most of the functionality of the operating system and do not requires kernel module's code access rights. 3. System utility: These programmes are responsible to do specialized, individual level tasks. Basis Features: Some of the features of Linux OS are: Portable Open source Multi-user Multiprogramming Hierarchical file system Security... etc., courtesy: Pinterest Benefits of Using L...

Cloud computing on AWS

  CLOUD COMPUTING ON AMAZON WEB SERVICES(BASICS) AWS(Amazon Web Service) is a cloud service platform that enables users to access on demand services like database storage, virtual cloud server, networking et., AWS is a platform that offers flexible, reliable, scalable, easy-to-use and cost-effective cloud computing solutions. AWS is a combination of three services: Infrastructure as a service(IaaS) platform as a service (PaaS) software as a service(SaaS) History of AWS: AWS service has been created and discovered its cloud platform in the year 2006. In 2012 holds first customer event, in 2015 it reveals revenues achieved of nearly $4.8 billion and In 2019 offers nearly 100 cloud services. Some of the important AWS services: Compute storage  Database Networking Messaging  Management tools Some of the Companies using AWS services: Instagram Netflix Pinterest Dropbox Talk box Application of AWS services: Social Networking Search Engines Storage, backup Application hosting We...